top of page

Search results

616 results found with an empty search

  • FinTech Provider | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Leading FinTech Provider Reduces Security Risks With AlgoSec Organization FinTech Provider Industry Technology Headquarters Download case study Share Customer
success stories "With AlgoSec, we get a holistic view of how our entire network operates.” FinTech company gains a holistic view of hybrid network, enhances compliance posture. BACKGROUND The company has thousands of employees and annual revenue over a billion euros. The company manages 168,750 banking workstations, over 82.2 million customer accounts and ensures nationwide smooth cash supply with its 34,000 ATMs and self-service terminals. THE CHALLENGE The company relies on over 170 firewalls from Check Point Software, Juniper, and Cisco. They also have over 48,000 virtual servers, and security controls including proxies, security gateways, DDoS protection, and intrusion protection systems (IPS) from vendors including Check Point, Juniper, Cisco, and F5. Their networks process approximately 3.17 petabytes daily. Some of the challenges included: Difficulty maintaining internal toolset. High maintenance costs for their internal tools. Lack of visibility into their network. THE SOLUTION The company was searching for a solution that provided: Automation for their entire network, including software-defined networks. Visibility of the required communications of the business applications. Review and approval of traffic flows. Ability to apply a predefined set of firewall rules to newly deployed virtual machines. Following an in-depth evaluation, the company selected AlgoSec’s security policy management solution. “The main reason we chose AlgoSec was extensive support for multiple firewall vendors,” said their IT systems engineer. “We have a multi-vendor strategy, and AlgoSec fully supports all of the vendors that we are using.” For over a decade, they have been using AlgoSec’s Security Policy Management Solution, which includes AlgoSec Firewall Analyzer and AlgoSec FireFlow. After several years of relying just on Firewall Analyzer and FireFlow, they also added AlgoSec AppViz and AppChange (formerly AlgoSec BusinessFlow) to their toolkit. AlgoSec Firewall Analyzer ensures security and compliance by providing visibility and analysis into complex network security policies. AlgoSec FireFlow improves security and saves security staffs’ time by automating the entire security policy change process, eliminating manual errors, and reducing risk. AlgoSec AppViz provides critical security information regarding the firewalls and firewall rules supporting each connectivity flow by letting users discover, identify, and map business applications. AlgoSec AppChange empowers customers to make changes at the business application level, including application migrations, server deployment, and decommissioning projects. “AppViz and AppChange provide a more application-centric viewpoint. It’s really helpful for communication within our business departments,” said their IT engineer. THE RESULTS By using the AlgoSec Security Management solution, the company was able to automate their network policy change management processes, enhance their compliance posture, accelerate hardware migrations, and gain deep visibility into their hybrid network. Some of the benefits gained include: Deep integration and visibility into their hybrid network. Faster firewall migrations and deployments of virtual firewalls. Eliminated unnecessary policy changes and reduced the time required to process policy changes. Ability to review and approve communication flows (a PCI DSS requirement). Automatic assessment and reporting for regulations including PCI DSS and Sarbanes-Oxley (SOX). “The network map is one of the keys in AlgoSec,” said their network engineer. “The greatest benefit we had from AlgoSec is the integration into the network and holistic view of how our entire network operated,” added the network engineer. “AlgoSec really fits into our environment. You can customize AlgoSec to fit into your business processes and workflows,” noted the engineer. “We have a long partnership with AlgoSec and really appreciate working together and the great support we receive.” Schedule time with one of our experts

  • Network Security for VMware NSX | algosec

    Security Policy Management with Professor Wool Network Security for VMware NSX Network Security for VMware NSX with Professor Wool is a whiteboard-style series of lessons that examine the some of the challenges of and provide technical tips for managing security policies across the VMware NSX software-defined data center and traditional data center. Lesson 1 VMware’s NSX enables datacenter owners to secure East-West traffic using filtering policies that are enforced by the VMware infrastructure. However, migrating from existing traditional filtering technologies to VMware NSX can be a daunting task. In this lesson Professor will discuss why it’s important to understand the motivations for a migration to NSX in order to successfully plan and implement the actual migration to the VMware NSX platform. Migrating to NSX: Understanding the Why in Order to Figure Out the How Watch Lesson 2 When setting up an NSX data center you need to write filtering policies for any traffic that goes into an NSX data center, exits from it, or moves between different servers inside the NSX data center. In this lesson, Professor Wool recommends a multi-stage process to help users write secure and effective policies for east East-West traffic. Tips on How to Create Filtering Policies for NSX Watch Lesson 3 Once the NSX environment is up and running it needs to be part of the organization’s network security policy change process, and subject to the organization’s governance, audit, and regulatory compliance requirements. In this lesson Professor Wool discusses how to approach managing changes, auditing and compliance when the security team doesn’t ‘own’ the virtual environment. Best Practices for Bringing NSX Security Policy Management into the InfoSec Fold Watch Have a Question for Professor Wool? Ask him now Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • BSI Standard 200 EN - AlgoSec

    BSI Standard 200 EN Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • 비즈니스 속도에 따른 맞춤형 보안 관리 - AlgoSec

    비즈니스 속도에 따른 맞춤형 보안 관리 Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | Managing network connectivity during mergers and acquisitions

    Prof. Avishai Wool discusses the complexities of mergers and acquisitions for application management and how organizations can securely... Security Policy Management Managing network connectivity during mergers and acquisitions Prof. Avishai Wool 2 min read Prof. Avishai Wool Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 7/22/21 Published Prof. Avishai Wool discusses the complexities of mergers and acquisitions for application management and how organizations can securely navigate the transition It comes as no surprise that the number of completed Mergers and Acquisitions (M&As) dropped significantly during the early stages of the pandemic as businesses closed ranks and focused on surviving rather than thriving. However, as we start to find some reprieve, many experts forecast that we’ll see an upturn in activity. In fact, by the end of 2020, M&A experienced a sudden surge and finished the year with only a 3% decline on 2019 levels. Acquiring companies is more than just writing a cheque. There are hundreds of things to consider both big and small, from infrastructure to staffing, which can make or break a merger. With that in mind, what do businesses need to do in order to ensure a secure and successful transition? When two worlds collide For many businesses, a merger or acquisition is highly charged. There’s often excitement about new beginnings mixed with trepidation about major business changes, not least when it comes to IT security. Mergers and acquisitions are like two planets colliding, each with their own intricate ecosystem. You have two enterprises running complex IT infrastructures with hundreds if not thousands of applications that don’t just simply integrate together. More often than not they perform replicated functions, which implies that some need to be used in parallel, while others need to be decommissioned and removed. This means amending, altering, and updating thousands of policies to accommodate new connections, applications, servers, and firewalls without creating IT security risks or outages. In essence, from an IT security perspective, a merger or acquisition is a highly complicated project that, if not planned and implemented properly, can have a long-term impact on business operations. Migrating and merging infrastructures One thing a business will need before it can even start the M&A process is an exhaustive inventory of all business applications spanning both businesses. An auto-discovery tool can assist here, collecting data from any application that is active on the network and adding it to a list. This should allow the main business to create a map of network connectivity flows which will form the cornerstone of the migration from an application perspective. Next comes security. A vulnerability assessment should be carried across both enterprise networks to identify any business-critical applications that may be put at risk. This assessment will give the main business the ability to effectively ‘rank’ applications and devices in terms of risk and necessity, allowing for priority lists to be created. This will help SecOps focus their efforts on crucial areas of the business that contain sensitive customer data, for instance. By following these steps you’ll get a clear organizational view of the entire enterprise environment and be able to identify and map all the critical business applications, linking vulnerabilities and cyber risks to specific applications and prioritize remediation actions based on business-driven needs. The power of automation While the steps outlined above will give you with an accurate picture of your IT topology and its business risk, this is only the first half of the story. Now you need to update security policies to support changes to business applications. Automation is critical when it comes to maintaining security during a merger or acquisition. An alarming number of data breaches are due to firewall misconfigurations, often resulting from attempts to change policies manually in a complex network environment. This danger increases with M&A, because the two merging enterprises likely have different firewall setups in place, often mixing traditional with next-generation firewalls or firewalls that come from different vendors. Automation is therefore essential to ensure the firewall change management process is handled effectively and securely with minimal risk of misconfigurations. Achieving true Zero-Touch automation in the network security domain is not an easy task but over time, you can let your automation solution run handsfree as you conduct more changes and gain trust through increasing automation levels step by step. Our Security Management Solution enables IT and security teams to manage and control all their security devices – from cloud controls in public clouds, SDNs, and on-premise firewalls from one single console. With AlgoSec you can automate time-consuming security policy changes and proactively assess risk to ensure continuous compliance. It is our business-driven approach to security policy management that enables organizations to reduce business risk, ensure security and continuous compliance, and drive business agility. Maintaining security throughout the transition A merger or acquisition presents a range of IT challenges but ensuring business applications can continue to run securely throughout the transition is critical. If you take an application centric approach and utilize automation, you will be in the best position for the merger/migration and will ultimately drive long term success. To learn more or speak to one of our security experts, schedule your personal demo . Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • The 6 best practices to stay secure in the hybrid cloud | AlgoSec

    What to do if your network is infected by ransomware How to prepare a ransomware playbook, using the existing capabilities of network security policy management tools Webinars The 6 best practices to stay secure in the hybrid cloud What if we told you that there were just six things that you can start doing to be more secure in your hybrid cloud environment? In this session, you’ll get clear insight on what you can do right away to tighten your hybrid cloud network security. From visibility through network management, to risk and cleanup – security expert Omer Ganot will guide you through the steps to help you stay secure. April 28, 2021 Omer Ganot Product Manager Relevant resources 6 must-dos to secure the hybrid cloud Read Document Six best practices for managing security in the hybrid cloud Keep Reading 6 best practices to stay secure in the hybrid cloud Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Cloud security configuration and policy management - AlgoSec

    Cloud security configuration and policy management Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Cloud for Microsoft Azure | AlgoSec

    Optimize cloud security and management with AlgoSec Cloud for Microsoft Azure, providing visibility, compliance, and automation for your hybrid cloud environment. AlgoSec Cloud for Microsoft Azure Cloud security policy and configuration management made simple As organizations adopt cloud strategies and migrate applications to Microsoft Azure and other clouds to take advantage of economies of scale, they face new levels of complexity and risk to their security posture. Security controls and network architectures in Azure are distinct from those found in on-premise data centers. Customers of Azure services often do not know how to use them securely. AlgoSec Cloud enables effective management of the security control layers across the hybrid and multi-cloud estate, including Microsoft Azure. Schedule a Demo Cloud security main challenges IT and Security staffs find it difficult to create and maintain security in the cloud due to: Complexity of multiple layers of security controls includingCloud providers’ built-in configurations that impact security posture, such as IAM permissions, encryption state, security groups, public/private permissions, asset types like databases, storage and accounts, as well as configuration types like deployment location, networks ACLs, and Misconfigurations can result in security risks across various assets, including IaaS, PaaS and accounts. Security products by cloud providers with many different mechanisms and operational rules and techniques like Azure Security products by independent security vendors (e.g., Next Generation Firewalls by Check Point and Palo Alto Networks). Multiple public clouds along with private clouds and on-premise Security professionals are challenged by the need to understand the differences in the technologies while managing them separately using multiple consoles and diverse tools. Multiple stakeholders managing the security in the cloud. Unlike on-prem networks where policies are typically managed by security teams, in the cloud, other stakeholders (application developers, DevOps, cloud teams) manage changes to cloud configurations and security rules, challenging consistency and control, and increasing the risk of misconfigurations Schedule a Demo All cloud security under a single umbrella AlgoSec Cloud enables effective security management of the various security-control layers across the multi-cloud estate. AlgoSec Cloud central management provides instant visibility, risk assessment and compliance analysis, enabling enforcement of company and regulatory policies, and proactive detection of misconfigurations Schedule a Demo Manage your Microsoft Azure security environment When used in conjunction with AlgoSec’s Firewall Analyzer and FireFlow, customers benefit from a hybrid approach, spanning on-premise, SDN and legacy network security. Continuous Visibility. Always know about the assets that require protection and the multiple security constructs and configurations protecting them. Monitor changes to the cloud configuration and the potential risk of each change. Risk management and compliance. Enforce company and regulatory policies while verifying adherence to best practices. Proactively detect misconfigurations in access, permissions and other configurations to protect cloud assets, including cloud accounts, VMs, storage, databases and more. Automated central management of security policies. Manage network security controls (Network Security Groups, etc.) in one system across multiple accounts, regions and VNETs. Leverage a uniform network model and change- management framework that covers the hybrid and multi-cloud environment. Schedule a Demo Azure Firewall AlgoSec delivers an intuitive and effective central management solution for Azure Firewall, Microsoft’s cloud-native, scalable network and application firewall. Users can consistently manage multiple instances of Azure Firewalls across regions and multiple Azure accounts. Schedule a Demo Quick deployment AlgoSec Cloud is an agentless SaaS solution and is easy to deploy in minutes. It offers immediate ROI and significant security improvements. Schedule a Demo Key Business Benefits Enhanced visibility across the entire hybrid and multi-cloud estate Improved cloud-security posture to avoid breaches Automatic compliance assurance with constant audit-readiness Secure change management at the speed of cloud deployment Reduced manual labor, errors, and associated risks and costs Schedule a Demo AlgoSec Cloud Advantages Unified view of the entire network, hybrid and multi-cloud estates from a unified platform Simplified management of complex multi-layered cloud security controls Automatic risk detection and recommended best practices Avoidance of false alarms – risk analysis takes into consideration all security constructs Schedule a Demo Comprehensive and Unified Security for Heterogeneous Environments AlgoSec seamlessly integrates with all leading brands of traditional and next-generation firewalls and cloud security controls as well as routers, load balancers, web proxies, and SIEM solutions, to deliver unified security policy management across any hybrid-cloud, multi-cloud, SDN, and on-premise network. Additional devices can be added via the AlgoSec Extension Framework. Let's start your journey to our business-centric network security. Schedule a Demo Select a size Cloud security policy and configuration management made simple Cloud security main challenges All cloud security under a single umbrella Manage your Microsoft Azure security environment Azure Firewall Quick deployment Key Business Benefits AlgoSec Cloud Advantages Comprehensive and Unified Security for Heterogeneous Environments Get the latest insights from the experts Choose a better way to manage your network

  • THE FIREWALL AUDIT CHECKLIST Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation - AlgoSec

    THE FIREWALL AUDIT CHECKLIST Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Global Transport | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Global Transport Company Moves Firewall Changes Faster Organization Global Transport Industry Transportation Headquarters International Download case study Share Customer
success stories "Automation is definitely the way to go. We can now stay on top of the process even while we migrate our firewalls" Background A global transport and logistics company operates in nearly 100 countries and employs 50,000 people. From its 1000 offices, the company manages supply-chain solutions for thousands of customers all over the world each and every day. Found in virtually every industry, customers range from large international companies that require transportation services by sea and air to medium size business that ship mainly over the road. In addition, the company offers warehousing solutions on every continent to help customers with their logistics. Challenges Operating four major data centers on four continents, the security team’s daily tasks had become overwhelming. For the last several years, the company invested heavily in its rapidly growing IT and network security staff, but at its current size and level of activity, finding enough experienced staffers was practically impossible and too expensive to sustain. The only way forward was a network security automation solution that would: Automate many of the daily change requests across the 50+ firewalls, saving time so that IT and security staffers could work on other critical tasks Eliminate errors in firewall rules Demonstrate the ability to work with Cisco FirePower NGFW in the future The company also presented a special challenge in the form of its already-existing deployment of Cisco Bridge Virtual Interface (BVI) devices. The BVIs essentially act as Layer 2 firewalls. Since they, too, store firewall rules, they have to be included in the automation process. Solution The company brought in three leading Network Security Policy Management (NSPM) solutions to compete in a three-month proof-of-concept contest. The combination of AlgoSec Firewall Analyzer (AFA) and AlgoSec FireFlow (AFF) stood above the rest. AlgoSec Firewall Analyzer ensures security and compliance by providing visibility and analysis into complex network security policies. AlgoSec FireFlow improves security and saves security staffs’ time by automating the entire security policy change process, eliminating manual errors, and reducing risk. Results The two AlgoSec products, Firewall Analyzer and FireFlow went into production in mid-2018 where they have been working ever since, with the following results: Usability was outstanding—the products integrate well and are easy to learn and operate Single-pane-of-glass visibility across the network was suddenly available and useful to the network security staff The automation demonstrated the ability to slash the time required to push firewall changes and to eliminate errors The company found AlgoSec’s Tier 3 support to be impressive. Working directly with Tier 3 personnel and the ever-eager AlgoSec developers, the company’s Senior Technology Architect and other senior security analysts were able to work closely with AlgoSec to solve the BVI conundrum and implement the entire AlgoSec solution. Schedule time with one of our experts

  • AlgoSec | Achieving policy-driven application-centric security management for Cisco Nexus Dashboard Orchestrat

    Jeremiah Cornelius, Technical Lead for Alliances and Partners at AlgoSec, discusses how Cisco Nexus Dashboard Orchestrator (NDO) users... Application Connectivity Management Achieving policy-driven application-centric security management for Cisco Nexus Dashboard Orchestrat Jeremiah Cornelius 2 min read Jeremiah Cornelius Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 1/2/24 Published Jeremiah Cornelius, Technical Lead for Alliances and Partners at AlgoSec, discusses how Cisco Nexus Dashboard Orchestrator (NDO) users can achieve policy-driven application-centric security management with AlgoSec. Leading Edge of the Data Center with AlgoSec and Cisco NDO AlgoSec ASMS A32.6 is our latest release to feature a major technology integration, built upon our well-established collaboration with Cisco — bringing this partnership to the front of the Cisco innovation cycle with support for Nexus Dashboard Orchestrator (NDO) . NDO allows Cisco ACI – and legacy-style Data Center Network Management – to operate at scale in a global context, across data center and cloud regions. The AlgoSec solution with NDO brings the power of our intelligent automation and software-defined security features for ACI, including planning, change management, and microsegmentation, to this global scope. I urge you to see what AlgoSec delivers for ACI with multiple use cases, enabling application-mode operation and microsegmentation, and delivering integrated security operations workflows. AlgoSec now brings support for Shadow EPG and Inter-Site Contracts with NDO, to our existing ACI strength. Let’s Change the World by Intent I had my first encounter with Cisco Application Centric Infrastructure in 2014 at a Symantec Vision conference. The original Senior Product Manager and Technical Marketing lead were hosting a discussion about the new results from their recent Insieme acquisition and were eager to onboard new partners with security cases and added operations value. At the time I was promoting the security ecosystem of a different platform vendor, and I have to admit that I didn’t fully understand the tremendous changes that ACI was bringing to security for enterprise connectivity. It’s hard to believe that it’s now seven years since then and that Cisco ACI has mainstreamed software-defined networking — changing the way that network teams had grown used to running their networks and devices since at least the mid-’90s. Since that 2014 introduction, Cisco’s ACI changed the landscape of data center networking by introducing an intent-based approach, over earlier configuration-centric architecture models. This opened the way for accelerated movement by enterprise data centers to meet their requirements for internal cloud deployments, new DevOps and serverless application models, and the extension of these to public clouds for hybrid operation – all within a single networking technology that uses familiar switching elements. Two new, software-defined artifacts make this possible in ACI: End-Point Groups (EPG) and Contracts – individual rules that define characteristics and behavior for an allowed network connection. ACI Is Great, NDO Is Global That’s really where NDO comes into the picture. By now, we have an ACI-driven data center networking infrastructure, with management redundancy for the availability of applications and preserving their intent characteristics. Through the use of an infrastructure built on EPGs and contracts, we can reach from the mobile and desktop to the datacenter and the cloud. This means our next barrier is the sharing of intent-based objects and management operations, beyond the confines of a single data center. We want to do this without clustering types, that depend on the availability risk of individual controllers, and hit other limits for availability and oversight. Instead of labor-intensive and error-prone duplication of data center networks and security in different regions, and for different zones of cloud operation, NDO introduces “stretched” shadow EPGs, and inter-site contracts, for application-centric and intent-based, secure traffic which is agnostic to global topologies – wherever your users and applications need to be. NDO Deployment Topology – Image: Cisco Getting NDO Together with AlgoSec: Policy-Driven, App-Centric Security Management  Having added NDO capability to the formidable shared platform of AlgoSec and Cisco ACI, regional-wide and global policy operations can be executed in confidence with intelligent automation. AlgoSec makes it possible to plan for operations of the Cisco NDO scope of connected fabrics in application-centric mode, unlocking the ACI super-powers for micro-segmentation. This enables a shared model between networking and security teams for zero-trust and defense-in-depth, with accelerated, global-scope, secure application changes at the speed of business demand — within minutes, rather than days or weeks. Change management : For security policy change management this means that workloads may be securely re-located from on-premises to public cloud, under a single and uniform network model and change-management framework — ensuring consistency across multiple clouds and hybrid environments. Visibility : With an NDO-enabled ACI networking infrastructure and AlgoSec’s ASMS, all connectivity can be visualized at multiple levels of detail, across an entire multi-vendor, multi-cloud network. This means that individual security risks can be directly correlated to the assets that are impacted, and a full understanding of the impact by security controls on an application’s availability. Risk and Compliance : It’s possible across all the NDO connected fabrics to identify risk on-premises and through the connected ACI cloud networks, including additional cloud-provider security controls. The AlgoSec solution makes this a self-documenting system for NDO, with detailed reporting and an audit trail of network security changes, related to original business and application requests. This means that you can generate automated compliance reports, supporting a wide range of global regulations, and your own, self-tailored policies. The Road Ahead Cisco NDO is a major technology and AlgoSec is in the early days with our feature introduction, nonetheless, we are delighted and enthusiastic about our early adoption customers. Based on early reports with our Cisco partners, needs will arise for more automation, which would include the “zero-touch” push for policy changes – committing Shadow EPG and Inter-site Contract changes to the orchestrator, as we currently do for ACI APIC. Feedback will also shape a need for automation playbooks and workflows that are most useful in the NDO context, and that we can realize with a full committable policy by the ASMS Firewall Analyzer. Contact Us! I encourage anyone interested in NDO and enhancing their operational maturity in aligned network and security operation, to talk to us about our joint solution. We work together with Cisco teams and resellers and will be glad to share more. Schedule a demo Related Articles 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read 5 Multi-Cloud Environments Cloud Security Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • DIMENSION DATA | AlgoSec

    Explore Algosec's customer success stories to see how organizations worldwide improve security, compliance, and efficiency with our solutions. Dimension Data Enhances Delivery Of Managed Security Services With AlgoSec Organization DIMENSION DATA Industry Technology Headquarters Australia Download case study Share Customer
success stories "We were fortunate enough to get a double benefit from using AlgoSec in our environment — reducing costs to serve our clients, and expanding our service offerings" IT Solution Provider Streamlines and Automates Security Operations for Clients AlgoSec Business Impact Generate incremental revenue from new policy compliance management services Reduce cost of service for Managed Security Service offering Improve quality of service, assuring a direct and timely response to security issues Background Dimension Data, founded in 1983 and headquartered in Africa, provides global specialized IT services and solutions to help their clients plan, build, support and manage their IT infrastructures. The company serves over 6,000 clients in 58 countries and in all major industry verticals. Dimension Data serves 79% of the Global Fortune Top 100 and 63% of the Global Fortune 500. Challenge In an effort to bring greater efficiency and flexibility, Dimension Data Australia sought to apply security industry best practices and streamlined processes to its delivery methodology. Automation was identified as a key capability that would enable them to reduce service costs and increase quality of service. “The operational management of security infrastructure is quite labor intensive,” remarks Martin Schlatter, Security Services Product Manager at Dimension Data. “The principle reasons for automating managed services are reducing work time, freeing up people for other tasks, and leveraging expertise that is ‘built in’ the automated tool.” By doing this Dimension Data could offer better service to existing clients while expanding their client base. “Additionally, the increased appetite for the Managed Security Services offering has been fueled by an increasing focus on governance, risk management and compliance, and we are expected to deliver faster and more accurate visibility of the security and compliance posture of the network,” explains Schlatter. Solution Dimension Data selected the AlgoSec Security Management Solution as a part of their toolset to deliver their Managed Security Services, which include automated and fully integrated operational management of client security infrastructures. The intelligent automation at the heart of AlgoSec will enable Dimension Data’s team to easily and effectively perform change monitoring, risk assessment, compliance verification and policy optimization for their clients, and act upon the findings quickly. This includes getting rid of unused or obsolete rules in the policy, reordering rules to increase performance and identifying risky rules. Another key factor in the decision making process was the relationship between Dimension Data and AlgoSec. “AlgoSec was deemed most suitable to meet our delivery needs for Managed Services. We selected them for their specific technology fit, and flexibility to assist in growing our managed service business. The partnership element was eventually the overriding factor,” says Schlatter. Results With AlgoSec, Dimension Data is now able to deliver their clients a comprehensive view of the security posture of their network security devices. This is crucial to establishing a baseline understanding of a security network, which makes it possible to truly assess and remediate risks, errors and inefficiencies. The ability to automatically provide this type of information at the most accurate level provides a key competitive differentiator for the company and a large benefit for its clients. “The value-added contribution is saving time, in terms of automation,” remarked Schlatter. “We found a way to reduce costs by automating manual operational tasks. At the same time, we were fortunate enough to leverage AlgoSec to expand our service offerings, so we got a double benefit from using AlgoSec in our environment.” One of the major features of integrating AlgoSec into the Dimension Data solution is the ability to support multiple client domains from a single AlgoSec management console. “This scalable configuration has proven to be invaluable when managing multiple clients with complex multi-vendor, multi-device security environments,” says Schlatter. “It consolidates administrative tasks, cuts time and costs, and ensures proper administration and segregation of duties from our end.” AlgoSec enhances the Managed Security Services offerings by delivering comprehensive risk and compliance management. Dimension Data professionals can generate risk and audit-ready compliance reports in a fraction of the time and with much greater accuracy compared to traditional manual analysis. “Our clients who require ISO 27001 and PCI DSS accreditation have greatly benefitted from this,” said Schlatter. Schedule time with one of our experts

bottom of page